First published: Fri Dec 22 2023(Updated: )
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | ||
Redhat Enterprise Linux | =9.0 | |
ubuntu/linux | <5.15.0-92.102 | 5.15.0-92.102 |
ubuntu/linux | <6.5.0-15.15 | 6.5.0-15.15 |
ubuntu/linux-aws | <5.15.0-1052.57 | 5.15.0-1052.57 |
ubuntu/linux-aws | <6.5.0-1012.12 | 6.5.0-1012.12 |
ubuntu/linux-aws-5.15 | <5.15.0-1052.57~20.04.1 | 5.15.0-1052.57~20.04.1 |
ubuntu/linux-aws-6.2 | <6.2.0-1018.18~22.04.1 | 6.2.0-1018.18~22.04.1 |
ubuntu/linux-azure | <5.15.0-1054.62 | 5.15.0-1054.62 |
ubuntu/linux-azure | <6.5.0-1011.11 | 6.5.0-1011.11 |
ubuntu/linux-azure-5.15 | <5.15.0-1054.62~20.04.1 | 5.15.0-1054.62~20.04.1 |
ubuntu/linux-azure-6.2 | <6.2.0-1019.19~22.04.1 | 6.2.0-1019.19~22.04.1 |
ubuntu/linux-azure-fde | <5.15.0-1054.62.1 | 5.15.0-1054.62.1 |
ubuntu/linux-azure-fde-5.15 | <5.15.0-1054.62~20.04.1.1 | 5.15.0-1054.62~20.04.1.1 |
ubuntu/linux-azure-fde-6.2 | <6.2.0-1019.19~22.04.1.1 | 6.2.0-1019.19~22.04.1.1 |
ubuntu/linux-gcp | <5.15.0-1049.57 | 5.15.0-1049.57 |
ubuntu/linux-gcp | <6.5.0-1011.11 | 6.5.0-1011.11 |
ubuntu/linux-gcp-5.15 | <5.15.0-1049.57~20.04.1 | 5.15.0-1049.57~20.04.1 |
ubuntu/linux-gcp-6.2 | <6.2.0-1021.23~22.04.1 | 6.2.0-1021.23~22.04.1 |
ubuntu/linux-gke | <5.15.0-1049.54 | 5.15.0-1049.54 |
ubuntu/linux-gkeop | <5.15.0-1035.41 | 5.15.0-1035.41 |
ubuntu/linux-gkeop-5.15 | <5.15.0-1035.41~20.04.1 | 5.15.0-1035.41~20.04.1 |
ubuntu/linux-hwe-5.15 | <5.15.0-92.102~20.04.1 | 5.15.0-92.102~20.04.1 |
ubuntu/linux-hwe-6.5 | <6.5.0-15.15~22.04.1 | 6.5.0-15.15~22.04.1 |
ubuntu/linux-ibm | <5.15.0-1045.48 | 5.15.0-1045.48 |
ubuntu/linux-ibm-5.15 | <5.15.0-1045.48~20.04.1 | 5.15.0-1045.48~20.04.1 |
ubuntu/linux-intel-iotg | <5.15.0-1047.53 | 5.15.0-1047.53 |
ubuntu/linux-intel-iotg-5.15 | <5.15.0-1048.54~20.04.1 | 5.15.0-1048.54~20.04.1 |
ubuntu/linux-kvm | <5.15.0-1049.54 | 5.15.0-1049.54 |
ubuntu/linux-laptop | <6.5.0-1008.11 | 6.5.0-1008.11 |
ubuntu/linux-lowlatency | <6.5.0-15.15.1 | 6.5.0-15.15.1 |
ubuntu/linux-lowlatency-hwe-5.15 | <5.15.0-92.102~20.04.1 | 5.15.0-92.102~20.04.1 |
ubuntu/linux-lowlatency-hwe-6.5 | <6.5.0-15.15.1.1~22.04.1 | 6.5.0-15.15.1.1~22.04.1 |
ubuntu/linux-nvidia | <5.15.0-1043.43 | 5.15.0-1043.43 |
ubuntu/linux-nvidia-6.2 | <6.2.0-1015.15 | 6.2.0-1015.15 |
ubuntu/linux-oem-6.1 | <6.1.0-1029.29 | 6.1.0-1029.29 |
ubuntu/linux-oem-6.5 | <6.5.0-1013.14 | 6.5.0-1013.14 |
ubuntu/linux-oracle | <5.15.0-1050.56 | 5.15.0-1050.56 |
ubuntu/linux-oracle | <6.5.0-1014.14 | 6.5.0-1014.14 |
ubuntu/linux-oracle-5.15 | <5.15.0-1050.56~20.04.1 | 5.15.0-1050.56~20.04.1 |
ubuntu/linux-raspi | <5.15.0-1045.48 | 5.15.0-1045.48 |
ubuntu/linux-raspi | <6.5.0-1009.12 | 6.5.0-1009.12 |
ubuntu/linux-riscv | <6.5.0-15.15.1 | 6.5.0-15.15.1 |
ubuntu/linux-riscv-5.15 | <5.15.0-1048.52~20.04.1 | 5.15.0-1048.52~20.04.1 |
ubuntu/linux-starfive | <6.5.0-1006.7 | 6.5.0-1006.7 |
ubuntu/linux-xilinx-zynqmp | <5.15.0-1027.31 | 5.15.0-1027.31 |
debian/linux | 4.19.249-2 4.19.304-1 5.10.209-2 5.10.205-2 6.1.76-1 6.1.85-1 6.6.15-2 6.7.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)